Browse > Article
http://dx.doi.org/10.3837/tiis.2016.10.028

Efficient Top-k Join Processing over Encrypted Data in a Cloud Environment  

Kim, Jong Wook (Department of Media Software, Sangmyung University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.10, 2016 , pp. 5153-5170 More about this Journal
Abstract
The benefit of the scalability and flexibility inherent in cloud computing motivates clients to upload data and computation to public cloud servers. Because data is placed on public clouds, which are very likely to reside outside of the trusted domain of clients, this strategy introduces concerns regarding the security of sensitive client data. Thus, to provide sufficient security for the data stored in the cloud, it is essential to encrypt sensitive data before the data are uploaded onto cloud servers. Although data encryption is considered the most effective solution for protecting sensitive data from unauthorized users, it imposes a significant amount of overhead during the query processing phase, due to the limitations of directly executing operations against encrypted data. Recently, substantial research work that addresses the execution of SQL queries against encrypted data has been conducted. However, there has been little research on top-k join query processing over encrypted data within the cloud computing environments. In this paper, we develop an efficient algorithm that processes a top-k join query against encrypted cloud data. The proposed top-k join processing algorithm is, at an early phase, able to prune unpromising data sets which are guaranteed not to produce top-k highest scores. The experiment results show that the proposed approach provides significant performance gains over the naive solution.
Keywords
Cloud computing; top-k join query processing; database encryption; ranking; efficiency; rank join;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Theobald, G. Weikum, and R. Schenkel, “Top-k query evaluation with probabilistic guarantees,” in Proc. of the International Conference on Very Large Data Bases, 2004. Article (CrossRef Link).
2 K. Chakrabarti, V. Ganti, J. Han, and D. Xin, “Ranking objects based on relationships,” in Proc. of the ACM SIGMOD international conference on Management of data, 2006. Article (CrossRef Link).
3 T. Cheng, X. Yan, and K.C.C. Chang, “EntityRank: searching entities directly and holistically,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).
4 N. Ntarmos, I. Patlakas, and P. Triantafillou, “Rank join queries in NoSQL databases,” in Proc. of the International Conference on Very Large Data Bases, 2014. Article (CrossRef Link).
5 C. Doulkeridis, A. Vlachou, K. Norvag, Y. Kotidis, and N. Polyzotis, “Processing of Rank Joins in Highly Distributed Systems,” in Proc. of the International Conference on Data Engineering, 2012. Article (CrossRef Link).
6 R. Yu, M. Nagendra, P. Nagarkar, K.S. Canda, and J.W. Kim, “Data-Utility Sensitive Query Processing on Server Clusters to Support Scalable Data Analysis Services,” Lecture Notes in Business Information Processing, 74, pp. 155-184, 2011. Article (CrossRef Link).
7 N.D. Han, L. Han, D.M. Tuan, H.P. In, and M. Jo., “A Scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks,” Information Sciences, 284, pp. 157-166, 2014. Article (CrossRef Link).   DOI
8 K. Liang, M.H. Au, J.K. Liu, W. Susilo, D.S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, 52, pp. 95-108, 2015. Article (CrossRef Link).   DOI
9 Q. Xu, P. Ren, H. Song, and Q. Du, “Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations,” IEEE Access, 4, pp. 2840 – 2853, 2016. Article (CrossRef Link).   DOI
10 I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, “Cloud-centric multi-level authentication as a service for secure public safety device networks, IEEE Communications Magazine, 54(4), pp. 47-59, 2016. Article (CrossRef Link).   DOI
11 W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, “Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing,” IEEE Transactions on Services Computing, 2016. Article (CrossRef Link).
12 M. Shojafar, N. Cordeschi, and E. Baccarelli, “Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services,” IEEE Transactions on Cloud Computing, 2016. Article (CrossRef Link).
13 H. Dou, Y. Qi, W. Wei, and H. Song, “Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing,” in Proc. of International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), 2015. Article (CrossRef Link).
14 N. Cordeschi, M. Shojafar, and E. Baccarelli, “Energy-saving self-configuring networked data centers. Computer Networks,” 57(17), pp. 3479-3491, 2013. Article (CrossRef Link).   DOI
15 C. Li, Z. Sun, H. Wang, and H. Song. “A Novel Energy-Efficient k-Coverage Algorithm Based on Probability Driven Mechanism of Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, 2016. Article (CrossRef Link).
16 Amazon EC2. https://aws.amazon.com/ec2/. Article (CrossRef Link).
17 Z. Sun, Y. Zhang, Y. Nie, W. Wei, J. Lloret, and H. Song, “CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks,” Wireless Network, 2016. Article (CrossRef Link).
18 A. Boldyreva, N. Chenette, Y. Lee, and A. ONeill, “Order-preserving Symmetric Encryption,” in Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2009.Article (CrossRef Link).
19 R. Fagin, “Combining fuzzy information from multiple systems,” Journal of Computer and System Sciences, 58(1), 89-99, 1999. Article (CrossRef Link).   DOI
20 R. Fagin, A. Lotem, and M. Naor, “Optimal aggregation algorithms for middleware,” Journal of Computer and System Sciences, 64(4), pp. 614-656, 2003. Article (CrossRef Link).   DOI
21 Microsoft Azure. https://azure.microsoft.com/. Article (CrossRef Link).
22 M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings,” in Proc. of International ICST Conference on Security and Privacy in Communication Networks, 2010. Article (CrossRef Link).
23 K. Wu, E.J. Otoo, and A. Shoshani, “Optimizing bitmap indices with efficient compression,” JACM Transactions on Database Systems, 31(1), 1-38, 2006. Article (CrossRef Link).   DOI
24 Transaction Processing Performance Council. http://www.tpc.org. Article (CrossRef Link).
25 Microsoft Healthvault. http://www.healthvault.com. Article (CrossRef Link).
26 K.H. Huang, E.C. Chang, and S.J. Wang, “A Patient Centric Access Control Scheme for Personal Health Records in the Cloud.” in Proc. of Fourth International Conference on Networking and Distributed Computing, 2014. Article (CrossRef Link).
27 R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: protecting confidentiality with encrypted query processing,” in Proc. of the ACM Symposium on Operating Systems Principles, 2011. Article (CrossRef Link).
28 R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. of the ACM SIGMOD international conference on Management of data, 2004. Article (CrossRef Link).
29 T. Ge and S. Zdonik, “Answering aggregation queries in a secure system model,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).
30 H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the database-service-provider model,” in Proc. of the ACM SIGMOD international conference on Management of data, 2002. Article (CrossRef Link).
31 S. Tu, M.F. Kaashoek, S. Madden, and N. Zeldovich, “Processing analytical queries over encrypted data,” in Proc. of the International Conference on Very Large Data Bases, 2013. Article (CrossRef Link).
32 W.K. Wong, B. Kao, D.W.L. Cheung, R.Li, and S.M. Yiu, “Secure query processing with data interoperability in a cloud database environment,” in Proc. of the ACM SIGMOD international conference on Management of data, 2014. Article (CrossRef Link).
33 R. Fagin, A. Lotem, and M. Naor, “Optimal Aggregation Algorithms for Middleware,” in Proc. of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database system, 2001. Article (CrossRef Link).
34 S. Nepal and M.V. Ramakrishna, “Query processing issues in image(multimedia) databases,” in Proc. of the International Conference on Data Engineering, 1999. Article (CrossRef Link).
35 B. Arai, G. Das, D. Gunopulos, and N. Koudas, “Anytime measures for top-k algorithms,” in Proc. of the International Conference on Very Large Data Bases, 2007. Article (CrossRef Link).